Online Security

The University of Arizona uses Sophos Central to secure University systems. Sophos has a free home version that can be used. Information on Sophos' home version can be found on the software license website.

Encryption “scrambles” data in a way that it can only be read by someone who possesses the corresponding decryption key. If possible, encrypt your entire hard drive. If this is not available, protect individual files using such free products as 7-Zip.

Back Up Data

Since hard drives wear out and fail and devices can be lost or stolen, it is a good idea to always keep a backup copy of files you do not wish to lose.

Check with your local IT staff to see if a central back-up service is available.

If you must use physical media, such as an external hard drive or thumb drive, make sure that the backup is encrypted. Note: we have had instances of external hard drives being used for backup that were stolen and resulted in a data breach.

Secure Your Web Browser

Web browser default settings are designed to be secure. However, you may want to take additional precautions to protect your privacy and enhance security.

Use the built-in browser security settings which you can adjust to get your desired coverage and protection

If you do not need pop-ups, disable them or at least manage them in your settings

Avoid installing add-ons, plugins, toolbars, and extensions. Add-ons from unreputable sources can pose potential risks to privacy and data security, so only download the ones you absolutely need

Take advantage of your browser’s private "do not track" browsing features when you don’t want information saved to your device about the sites and pages you have visited.

Create a "User" Account for Routine Computer Use

Add a "User" account to your computer, and use that for day-to-day use.

Only use your "Administrator" account when you need to install software.

Secure Your Physical Environment

Online security also involves physical security. Being aware of your physical surroundings, and securing your device when it is unattended, are important steps in online security.

Don't leave your devices in an unsecured area, or unattended and logged on, especially in public places. The physical security of your machine is just as important as its technical security.

If you need to leave your device for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.

Now that computers have the capability to see and hear us via webcams and microphones, a good tip to defend against this is to simply tape your webcam. Just take a small piece of tape and cover the lens. When you need to use your webcam, just peel it off and replace it later.